The post Worth Reading: Creating an IXP in Denver appeared first on 'net work.
Qualcomm and Microsoft seem to be aligning their orbits with each other.
The company’s customers include Macy’s, NASA, the U.S. Air Force, and Amtrak.
The company shipped U.S-made equipment to Iran and North Korea.
When thinking about the ramifications of Avaya selling off its networking business, take the long view.
The paper in question is from 2008, and the remedies have already been implemented in every BGP implementation I know of (in fact, getting rid of the scanner is something that just went into FR Routing). The paper can be found here, and a presentation based on the paper can be found here. They use a different example than mine in the paper—it’s a bit more subtle.
In this case, the abstraction is treating an AS as a single “thing” to provide stability in the larger routing system. But any time you have an abstraction, including summarization and aggregation, there is always some possibility the abstraction will leak. Here the leak is an internal route metric change “leaking” into an actual change in the path through the network, although both paths still exist. There are more subtle changes, such as a route metric change causing an update to be sent even though the path itself hasn’t even changed, but I chose this example to make it easier to understand.
The post Leaky Abstraction: An Example appeared first on 'net work.
Extreme believes the deal will generate a minimum of $200M in revenue for fiscal 2018.
Tough day for Cisco. A large number of Cisco software releases and devices were comprehensively pwned by US Gov spy agencies. This isn’t surprising, thats what they are supposed to do but now the details have been published on WikiLeaks.
This LinkedIn blog post outlines some of what has been found.
When I took a quick look at Wikileaks data, the range of possibilities is substantial but require access to the device itself. The Cisco post has details on the range of exploits in their response published today: http://blogs.cisco.com/security/the-wikileaks-vault-7-leak-what-we-know-so-far which says its too early to frame a response. I agree.
Some thoughts: